Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing de Bruijn graph of metagenome assembly for metatranscriptome analysis., and . CoRR, (2015)Understanding Membership Inferences on Well-Generalized Learning Models., , , , , , , and . CoRR, (2018)A computational approach toward label-free protein quantification using predicted peptide detectability., , , , , , , and . ISMB (Supplement of Bioinformatics), page 481-488. (2006)Learning your identity and disease from research papers: information leaks in genome wide association study., , , , and . ACM Conference on Computer and Communications Security, page 534-544. ACM, (2009)Towards Fair Cross-Domain Adaptation via Generative Learning., , , , and . CoRR, (2020)Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning., , , , , , , and . USENIX Security Symposium, page 3529-3545. USENIX Association, (2023)Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX., , , , , , , and . CCS, page 2421-2434. ACM, (2017)Practical and Efficient in-Enclave Verification of Privacy Compliance., , , , , , , , , and . DSN, page 413-425. IEEE, (2021)Protein Domain Embeddings for Fast and Accurate Similarity Search., , and . RECOMB, volume 14758 of Lecture Notes in Computer Science, page 421-424. Springer, (2024)Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance., , , , , , , , , and 1 other author(s). CoRR, (2019)